View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Check Point unveils Web 2.0 security tool

Is Big Brother watching you?

By Steve Evans

Check Point has unveiled a new software blade that it hopes will enable companies to secure their assets against threats from social networks and other Web 2.0 tools.

The firm said that its new Application Control Software Blade should enable organisations to identify, allow, block or limit the use of thousands of Web 2.0 applications, whether they are websites or widgets such as TweetDeck, which is used to access the Twitter social network service.

The blade will use Check Point’s new AppWiki, which stores information on over 4,500 applications and over 50,000 widgets that span 150 categories such as social networking, media streaming and instant messaging. The firm claims that this is the most extensive database of Internet applications.

The platform takes advantage of Check Point’s UserCheck feature, which uses pop up messages to warn workers of the potential security risk of their actions and asks them to confirm if they are using the site or app for work or personal reasons.

It is designed to engage users and make them think more about their actions, Check Point claims. All actions are logged so users thinking they can get away with a bit of personal Facebook or Twitter time when they have claimed it is for business use will be in for a bit of a shock.

Speaking to CBR about the announcement, Gabi Reish, Check Point’s global head of network security, denied that some workers may feel uncomfortable with having all actions logged. "It’s not like Big Brother, that’s a negative attitude," he said. "The IT department wants to be in control and wants workers to think more about what they are doing."

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

The new software was designed as a result of the dramatic increase in the use of social media and other Web 2.0 tools throughout the workplace, for business as well as personal reasons, Check Point said. Their use increases the risk of malware, data loss and bandwidth difficulties as well as raising questions about worker productivity and whether policies are being adhered to.

Companies do not want to ban access altogether because there are many legitimate uses for social networking sites in the enterprise, but according to Reish IT departments often don’t have full control over what workers are doing.

"IT admins often lack real visibility into what people are using them for," he told CBR. "Creating a black and white environment [where access is either granted or blocked completely] is difficult to control and so companies will often revert back to letting all users access what they want. With this you can allow access to certain sites or apps to an individual, groups, such as marketing, or the whole organisation. It’s a practical way to enforce app control."

Check Point said that general availability of its Application Control Software Blade will be in Q4 2010.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU